Upload
lancope-inc
View
276
Download
2
Tags:
Embed Size (px)
Citation preview
© 2014 Lancope, Inc. All rights reserved.
Outline
• What are Crown Jewels?
• Who is Attacking?
• Where to Look?
• How to Look?
• “By Data” Grouping
• Data Anomaly Alarms
• Map/Relationship Policy
• User Defined Criteria
• Demo
2
© 2014 Lancope, Inc. All rights reserved.
Crown Jewels
• Card holder data (PCI)
• Patient records (HIPAA)
• Trade secrets
• Competitive information (M&A)
• Employee data (PII)
• State Secrets
Data that is valuable to attackers
3
© 2014 Lancope, Inc. All rights reserved.
Why do attackers care?
Attacker Jewel Motivation
Criminals PCI Data $4-$12/card
Criminals Patient Records $30-$50/record
Activists Anything Shaming
State Sponsored Trade Secrets Geopolitical
State Sponsored Patient Records ?!?!!!!
© 2014 Lancope, Inc. All rights reserved.
WAN DATACENTER
ACCESS
CORE3560-X
Atlanta
New York
San Jose
3850 Stack(s)
Cat4k
ASAInternet
Cat6k
VPC Servers
3925 ISR
ASR-1000
Nexus 7000 UCS with Nexus 1000v
© 2014 Lancope, Inc. All rights reserved.
Where to Look?North, South, EAST AND WEST = Every Communication
Signature
Anomaly Behavior
Advanced Detection Methods
Signature = Object against blacklist• IPS, Antivirus, Content Filter
Behavior = Inspect Victim behavior against blacklist• Malware Sandbox, NBAD, HIPS, SEIM
Anomaly = Inspect Victim behavior against whitelist• NBAD, Quantity/Metric based—not Signature
based
Signature Behavior Anomaly
Known Exploits BEST Good Limited
0-day Exploits LimIted BEST Good
Credential Abuse Limited Limited BEST
The New Security Model
© 2014 Lancope, Inc. All rights reserved.
BEFOREDiscoverEnforce Harden
AFTERScope
ContainRemediate
Attack Continuum
Network Endpoint Mobile Virtual Cloud
Detect Block
Defend
DURING
Point in Time Continuous
© 2014 Lancope, Inc. All rights reserved.
By Data Grouping
• Find your data
• “Pull the thread” with Top Peers/Flow Tables
• Host Group Policies with lower tolerance
Find your jewels
8
© 2014 Lancope, Inc. All rights reserved.
Data Anomaly Alarms
• Suspect Data Hoarding
• Target Data Hoarding
• Total Traffic
• Suspect Data Loss
Counting Access
9
© 2014 Lancope, Inc. All rights reserved.
Map the Segmentation
• Logical vs. Physical
• Map Segmentation
Watch the logical roadways
1
© 2014 Lancope, Inc. All rights reserved.
Custom Events
• Evolution of HLV
• Alert when Segmentation fails
• Allows for NOR logic
Alert on Zero Tolerance
1